Europol Unveils Capture of XSS Forum Admin in Kyiv After 12 Years of Cybercrime Operations

Published:

spot_img

Major Cybercrime Arrest: A Breakdown of the XSS.is Operation

Europol’s Significant Announcement

On July 22, 2025, Europol revealed the capture of a key player behind the notorious cybercrime platform, XSS.is (previously known as DaMaGeLaB). The arrest took place in Kyiv, Ukraine, and was a collaborative effort involving the French Police, the Paris Prosecutor’s office, and local Ukrainian law enforcement. This operation marked the culmination of a detailed investigation initiated by French authorities back in July 2021.

Seizing the Cybercrime Hub

Alongside the arrest, law enforcement agencies successfully seized the clearnet domain of XSS.is. When users attempt to access the site, they are now met with a notice stating, “This domain has been seized by la Brigade de Lutte Contre la Cybercriminalité with assistance from the SBU Cyber Department.” This move not only disrupts the operations of the platform but also sends a powerful message about the efforts being made to combat cybercrime.

The Functionality and Reach of XSS.is

The forum had amassed over 50,000 registered users and had established itself as an essential marketplace for illicit goods, including stolen data, hacking tools, and various services. Law enforcement agencies have described XSS.is as a focal point for some of the most active and dangerous cybercriminal networks. These networks often coordinated, advertised, and even recruited new members through this platform.

The arrested individual didn’t just oversee the day-to-day operations; he also played a vital role as a trusted intermediary. By arbitrating disputes among users and ensuring the security of transactions, he facilitated ongoing criminal activities, effectively building a reliable ecosystem for illicit behavior.

Profit from Crime: A Financial Overview

The individual behind XSS.is is also believed to have operated thesecure.biz, a private messaging service designed for cybercriminals. Through these illicit activities, he reportedly generated profits of around €7 million ($8.24 million) primarily from advertising and facilitation fees. Investigators estimate that this person has been involved in the cybercrime field for close to twenty years, maintaining connections with key figures in the industry during that time.

A Look at the Operations of XSS.is

Active since 2013, XSS.is functioned as a comprehensive hub for cybercrime, offering services that ranged from access to compromised systems to ransomware-related offerings. It even featured an encrypted Jabber messaging server, enabling anonymous communication among criminals.

Another significant platform, Exploit, alongside XSS.is, has supported the Russian-speaking cybercriminal infrastructure, with a particular focus on attacking non-Russian-speaking countries. Recent data indicate that XSS has around 48,750 registered users and over 110,000 threads, showcasing its expansive reach.

To facilitate transactions effectively, XSS.is utilized an advanced reputation system. Members could rely on an escrow service appointed by the forum to ensure secure dealings and build up their reputations by making deposits.

Recent Developments in Cybercrime Disruption

The arrest of the XSS.is administrator comes shortly after a Europol-led operation targeting the infrastructure of a pro-Russian hacktivist group named NoName057(16). This group had been involved in conducting DDoS attacks against Ukraine and its allies using a volunteer-driven tool known as DDoSia.

A report from Recorded Future’s Insikt Group revealed that between July 1, 2024, and July 14, 2025, NoName057(16) targeted 3,776 unique hosts. Their targets included government agencies, public-sector entities, and various organizations across Europe, highlighting the group’s intent to disrupt those opposing Russia’s actions in Ukraine.

Target Breakdown and Operational Analysis

Ukraine bore the brunt of these attacks, experiencing the most significant share at 29.47% of the total targets. Other countries significantly affected included France, Italy, and Sweden. Interestingly, the United States was notably absent from the list of attackers, suggesting strategic targeting based on geopolitical tensions.

Analysis of NoName057(16)’s infrastructure has uncovered a sophisticated design featuring rapidly rotating command-and-control (C2) servers, ensuring resilience against law enforcement actions. With around 275 unique Tier 1 servers identified, the group has demonstrated a remarkable ability to maintain operational continuity.

The cybersecurity firm describes NoName057(16) as maintaining a high operational pace, engaging with about 50 unique targets daily. Their attack strategies leverage both network and application-layer DDoS methods, prioritizing high-volume floods aimed at overwhelming server resources to cause disruptions.

Conclusion

The arrest of the XSS.is administrator exemplifies the ongoing international efforts to dismantle cybercrime networks. By targeting crucial figures and disrupting platforms that facilitate illegal activities, law enforcement continues to stake a claim in the fight against cyber threats. With ongoing operations against groups like NoName057(16), the landscape of cybersecurity remains a frontline in global conflicts.

spot_img

Related articles

Recent articles

PyTorch Lightning and Intercom-client Compromised in Supply Chain Attacks Targeting Credential Theft

PyTorch Lightning and Intercom-client Compromised in Supply Chain Attacks Targeting Credential Theft In a significant cybersecurity breach, threat actors have compromised the widely used Python...

Event Security in the Middle East Advances Amidst Complex Challenges and Growing Global Demand

Event Security in the Middle East Advances Amidst Complex Challenges and Growing Global Demand In recent decades, the United Arab Emirates (UAE) and the broader...

CVE-2026-41940: Critical cPanel Authentication Bypass Risks Hosting Security

CVE-2026-41940: Critical cPanel Authentication Bypass Risks Hosting Security A newly identified security vulnerability, designated as CVE-2026-41940, has emerged as a significant threat within the web...

Redefining AI Performance Metrics in Security Operations Centers to Combat Evolving Threats

Redefining AI Performance Metrics in Security Operations Centers to Combat Evolving Threats The integration of artificial intelligence (AI) into Security Operations Centers (SOCs) is reshaping...